• Aucun résultat trouvé

ProM: The Process Mining Toolkit

N/A
N/A
Protected

Academic year: 2022

Partager "ProM: The Process Mining Toolkit"

Copied!
4
0
0

Texte intégral

(1)

ProM: The Process Mining Toolkit

W.M.P. van der Aalst1,2, B.F. van Dongen1, C. G¨unther1, A. Rozinat2, H.M.W. Verbeek1, and A.J.M.M. Weijters2

1 Department of Mathematics and Computer Science, Eindhoven University of Technology

P.O. Box 513, 5600 MB Eindhoven, The Netherlands

{w.m.p.v.d.aalst,b.f.v.dongen,c.guenther,h.m.w.verbeek}@tue.nl

2 Department of Industrial Engineering and Innovation Sciences, Eindhoven University of Technology

P.O. Box 513, 5600 MB Eindhoven, The Netherlands {a.rozinat,a.j.m.m.weijters}@tue.nl

Abstract. Nowadays, all kinds of information systems store detailed information in logs. Process mining has emerged as a way to analyze these systems based on these detailed logs. Unlike classical data mining, the focus of process mining is on processes. First, process mining allows us to extract a process model from an event log. Second, it allows us to detect discrepancies between a modeled process (as it was envisioned to be) and an event log (as it actually is). Third, it can enrich an existing model with knowledge derived from an event log. This paper presents our tool ProM, which is the world-leading tool in the area of process mining.

1 Process Mining

The goal of process mining is to extract information (like process models) from event logs. Typically, process mining assumes that it is possible to record events such that each event refers to an activity (a step in the process) and is related to a particular case (a process instance). Furthermore, additional data stored in the log (like the performer of the event, the timestamp of the event, or data elements recorded with the event) can be used.

The omnipresence of event logs is an important enabler of process mining:

Analysis of run-time behavior is only possible if events are recorded. Fortunately, all kinds of information systems provide the necessary detailed logs, like classical workflow management systems (Staffware), ERP systems (SAP), case handling systems (FLOWer), PDM systems (Windchill), CRM systems (Microsoft Dy- namics CRM), middleware (IBM WebSphere), and hospital information systems (Chipsoft). Also, all kinds of embedded systems increasingly log events, like medical systems (X-ray machines), mobile phones, car entertainment systems, production systems (e.g., wafer steppers), copiers, and sensor networks.

Process mining has emerged as a way to analyze systems and their actual use based on the event logs they produce [1,2,3,4,5,8,9]. Unlike classical data

(2)

models analyzes

records events, e.g.,

messages, transactions,

etc.

specifies configures implements

analyzes supports/

controls

people machines organizations components

business processes

Fig. 1. Process mining aims at extracting knowledge from event logs.

mining, the focus of process mining is on concurrent processes instead of on static or mainly sequential structures. Note that commercial “Business Intelligence”

(BI) tools are not doing any process mining: They typically look at aggregate data (frequencies, averages, utilization, service levels). Unlike BI tools, process mining looks “inside the process” (causal dependencies, bottlenecks) and at a very refined level. In a hospital context, BI tools focus on performance indicators such as the number of knee operations, the length of waiting lists, and the success rate of surgery, where process mining is more concerned with the paths followed by individual patients and whether certain procedures are followed or not.

Using process mining, typical manager questions that can be answered in- clude:

– What is the most frequent path in my process?

– To what extend do my cases comply with my process model?

– What are the routing probabilities in my process?

– What are the throughput times of my cases?

– What are the service times for my tasks?

– When will a case be completed?

– How much time was spent between any two tasks in my process?

– What are the business rules in my process, and are they being obeyed?

– How many of my people are typically involved in a case?

– Which people are central in my organization?

2 ProM

ProM is the world-leading process mining toolkit. It is an extensible frame- work that supports a wide variety of process mining techniques in the form of plug-ins. It is platform independent as it is implemented in Java, and can be downloaded free of charge fromwww.processmining.org. ProM is issued under

(3)

an open source license and we invite researchers and developers to contribute in the form of new plug-ins. The development of ProM is not restricted to the Eindhoven University of Technology: The current version of ProM includes work from researchers from all over the world, including for example Australia, Aus- tria, China, Germany, and Italy.

Currently, there are already more than 230 plug-ins available, and we support the import of (and the conversion between) several process modeling languages, like Petri nets (PNML, TPN), EPCs/EPKs (Aris graph format, EPML), YAWL, and many more. There are mining plug-ins, such as plug-ins supporting control- flow mining techniques (Alpha algorithm, Genetic mining, Heuristics Miner, Multi-phase mining), plug-ins analyzing the organizational perspective (Social Network miner, Staff Assignment miner), plug-ins dealing with the data per- spective (Decision miner), plug-ins for mining less-structured, flexible processes (Fuzzy Miner), elaborate data visualization plug-ins (Cloud Chamber Miner), and many more. Furthermore, there are analysis plug-ins dealing with the ver- ification of process models (Woflan analysis), verification of Linear Temporal Logic (LTL) formulas on a log, checking the conformance between a given pro- cess model and a log, and performance analysis (Basic statistical analysis, and Performance Analysis with a given process model). Finally, ProM offers a large array of log filters, which are a valuable tool for cleaning logs from undesired, or unimportant, artefacts.

3 Case studies

Thus far, ProM has been applied in a wide variety of organizations, which in- clude municipalities (Alkmaar, Heusden, Harderwijk, etc.), government agencies (Rijkswaterstaat, Centraal Justitieel Incasso Bureau, Justice department), in- surance related agencies (UWV), banks (ING Bank), hospitals (AMC hospital, Catharina hospital), multinationals (DSM, Deloitte),high-tech system manufac- turers and their customers (Philips Healthcare,ASML, Thales), and media com- panies (e.g. Winkwaves). To give some insights in the results we obtained so far, we provide some details on the three italicized organizations.

For a provincial office ofRijkswaterstaat (the Dutch National Public Works Department), we have conducted a case study on its invoice process, which has shown that the bad performance of this process was mainly due to the fact that some of the employees often work at remote sites. Furthermore, the case study showed that it is worthwhile to combine different mining perspectives to reach a richer understanding of the process. In this case, for example, the process model revealed the problems (loops), but it took an organizational model to identify the key players, and a case-oriented analysis to understand the impact of these loops on the process performance. Please see [1] for more information on this case study.

For ASML (the leading manufacturer of wafer scanners in the world), we have conducted a case study on its test process, which has yielded concrete suggestions for process improvement. These suggestions included reordering of

(4)

tasks to prevent feedback loops and using idle time for scheduling. However, this case study has also shown that further research is needed to develop process mining techniques that are particularly suitable for analyzing less structured processes like the highly dynamic test process of ASML. Please see [7] for details.

For the Dutch AMC hospital, we have conducted a case study which has shown that we were able to derive understandable models for large groups of patients, which was confirmed by people of the hospital. Nevertheless, this case study has also shown that traditional process mining approaches have problems dealing with unstructured processes as, for example, can be found in a hospital environment. Please see [6] for more information.

4 Conclusion

Process mining is a fertile field of research, and the ProM toolkit is the leading tool to open up this field. Using ProM, we can answer questions that are very relevant to managers, and case studies have shown that we are also able to do so in a real world setting.

References

1. W.M.P. van der Aalst, H.A. Reijers, A.J.M.M. Weijters, B.F. van Dongen, A.K.

Alves de Medeiros, M. Song, and H.M.W. Verbeek. Business Process Mining: An Industrial Application. Information Systems, 32(5):713–732, 2007.

2. W.M.P. van der Aalst, A.J.M.M. Weijters, and L. Maruster. Workflow Mining:

Discovering Process Models from Event Logs. IEEE Transactions on Knowledge and Data Engineering, 16(9):1128–1142, 2004.

3. R. Agrawal, D. Gunopulos, and F. Leymann. Mining Process Models from Workflow Logs. InSixth International Conference on Extending Database Technology, pages 469–483, 1998.

4. A. Datta. Automating the Discovery of As-Is Business Process Models: Probabilistic and Algorithmic Approaches. Information Systems Research, 9(3):275–301, 1998.

5. J. Herbst. A Machine Learning Approach to Workflow Management. InProceedings 11th European Conference on Machine Learning, volume 1810 of Lecture Notes in Computer Science, pages 183–194. Springer-Verlag, Berlin, 2000.

6. R. S. Mans, M.H. Schonenberg, M. Song, W. M. P. van der Aalst, and P. J. M.

Bakker. Application of process mining in healthcare - a case study in a Dutch hospital. In A. Fred, J. Filipe, and H. Gamboa, editors, Biomedical Engineering Systems and Technologies, volume 25 ofCommunications in Computer and Infor- mation Science, pages 425–438. Springer Berlin Heidelberg, 2009.

7. A. Rozinat, I. S. M. de Jong, C. W. G¨unther, and W. M. P. van der Aalst. Process mining applied to the test process of wafer steppers in ASML. InIEEE Transactions on Systems, Man, and CyberneticsPart C: Applications and Reviews. 2009. To appear.

8. A. Rozinat and W. M. P. van der Aalst. Conformance checking of processes based on monitoring real behavior. Information Systems (IS), 33(1):64–95.

9. A.J.M.M. Weijters and W.M.P. van der Aalst. Rediscovering Workflow Models from Event-Based Data using Little Thumb. Integrated Computer-Aided Engineering, 10(2):151–162, 2003.

Références

Documents relatifs

We used state-of-the-art process mining methods to analyze the trajectories of 1050 patient that are admitted to the emergency ward of a Dutch hospital 1 because they display

To map out this bridge we performed a literature study of both knowledge management challenges and resource metrics available in process mining.. This helped narrowing down the

Conformance checking aims to find discrepancies between the modeled behavior, i.e., the process model, and the observed behavior, i.e., the event data. As we have access to the

The purpose of this case study is to show how raw data extracted from TU/e systems can be transformed into reports that show insights about students’ video lecture usage and

Nevertheless, process-orientation is a core characteristic of business (process man- agement) software supporting concrete business tasks and processes in a technical man-

Figure 35 shows a zoom of the substatus wait-user in the first level, where we can see the substatus was used in five cases, just once it was used previous to complete a case, but

To provide proof that Process Mining is beneficial in a methodological approach of analysis in context of Business and IT gaps and the SEMBA method 4.. To provide insight in

1, extracted from Process Mining Manifesto, Process Mining is a set of techniques, tools, and methods to discover, monitor and improve real process- es (i.e., not assumed